ZIP Viewer Tool is a specialized tool for viewing damaged archive files of the ZIP format and recovering data from them. A professional solution created for everyone, the program opens corrupted ZIP archives and restores their contents with a few mouse clicks thanks to its advanced file analysis engine that uses a combination of several algorithms to achieve the best recovery efficiency.
SyncBack has established itself as world-class in the field of backup and synchronization software. Whether you're a beginner or advanced user, at home or work, SyncBack ensures your most valuable asset, data, remains protected. Backup - Protect your data Restore - Recover your lost files easily Copy Open Files - Backup live documents Versioning - Keep previous versions Incremental Backups - Does what is required FTP and Email - Online access Performance & Throttling - As fast as can be Synchronize - Work with 2 or more computers Secure - Keep confidential data private Compression - Keep your files small Automation - Set it and forget it Advanced Customization - A superb array of options Vista and 64-bit Compatible - Tested and optimized for Vista
Deep Freeze has changed the way IT Professionals approach end-point security; its non-restrictive concept offers the most robust workstation protection available. The need for IT professionals to perform rebuilds, re-image, or troubleshoot computers is eliminated with Deep Freeze's reboot-to-restore technology. The result is a dramatic reduction in support and IT expenditures and a substantial increase in computer uptime.
HijackThis inspects your computers browser and operating system settings to generate a log file of the current state of your computer. Using HijackThis you can selectively remove unwanted settings and files from your computer. Because the settings identified in a HijackThis log file can belong to both legitimate software and unwanted malware, it is important to use extreme caution when choosing to removing anything using HijackThis. HijackThis also comes with a process manager, HOSTS file editor, and alternate data stream scanner.
Jeefo Removal Tool is a lightweight utility that can help you clean the Win32.Jeefo.A malware from your system. This executable file infector is written in MinGW and presents a very interesting (and difficult to disinfect) infection technique. It contains various strings, encrypted with a trivial algorithm: .text:004012B0 decryption_loop: .text:004012B0 mov cl, [edx+ebx] .text:004012B3 dec cl .text:004012B5 mov [edx+eax], cl .text:004012B8 inc edx .text:004012B9 cmp edx, edi .text:004012BB jl short decryption_loop When an infected file is executed for the first time, the virus receives control and dumps a copy of itself in the Windows directory as svchost.exe and registeres itself to be executed at every system startup: under Windows 9x/Me it adds a key to HKEY_LOCAL_MACHINE SoftwareMicrosoftWindowsCurrentVersionRunServices; under NT/2000/XP, it creates a service called "Power Manager". The file infection algorithm is complex; in some cases, infected files get corrupted (the virus is not capable of handling certain resource types). The infected file has the following layout: 1) Virus 2) Original file's resources (bitmaps, icons, etc) -> thus the infected file has the same main icon as the original file 3) Original file chunks - encrypted The disinfection routine decrypts the file chunks, re-links the file, adds the resources and re-locates them to the new relative virtual address. Resource relocation is tricky and in some cases may cause the virus to fail (crash); however, these files are correctly disinfected by BitDefender. The virus contains the following text string: "Hidden Dragon virus. Born in a tropical swamp." encrypted with the same trivial encryption algorithm as above. When encrypted, the word "hidden" is transformed to "iJeefo" (this is where this virus got his name from).
RootkitRevealer is an advanced rootkit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit. RootkitRevealer successfully detects many persistent rootkits including AFX, Vanquish and HackerDefender (note: RootkitRevealer is not intended to detect rootkits like Fu that don't attempt to hide their files or registry keys). Since persistent rootkits work by changing API results so that a system view using APIs differs from the actual view in storage, RootkitRevealer compares the results of a system scan at the highest level with that at the lowest level. The highest level is the Windows API and the lowest level is the raw contents of a file system volume or Registry hive (a hive file is the Registry's on-disk storage format). Thus, rootkits, whether user mode or kernel mode, that manipulate the Windows API or native API to remove their presence from a directory listing, for example, will be seen by RootkitRevealer as a discrepancy between the information returned by the Windows API and that seen in the raw scan of a FAT or NTFS volume's file system structures.
The comprehensive Total Defense Anti-Virus solution offers integrated virus and spyware combating capabilities, guarding your PC from worms, Trojans, and other malware that can slow down or even damage your PC. Key Features: * NEW! Cloud Defense Scanner * NEW! Download Defender * Real-Time Virus & Spyware Protection * Fast Scanning * Continuous Updates * Automatic USB Scanning * Informative Reports Total Defense AntiVirus Plus offers comprehensive professional-grade security to home and home office PC users. This easy-to-use security solution features one of the world’s fastest scanning engines and protects your computer against viruses, worms, spyware, and other online threats. Designed specifically for home and home office environments, Total Defense AntiVirus Plus introduces some industry-leading anti-malware enhancements and automatic USB scanning technologies. It packs unprecedented power into an even smaller memory footprint, making your computer security leaner, meaner and smarter than ever before. The new release offers enhanced rootkit detection and removal. It also offers a visually refined, user-friendly interface that breaks down functions into intuitive sections. And Total Defense AntiVirus Plus is auto-upgradeable, which means you don’t have to check to download product upgrades and go through cumbersome steps to step up your security. It all happens seamlessly, keeping your system fighting fit to fight against and remove all the latest malware challenges. In addition to its fast scanning engine and smart malware detection capabilities, Total Defense AntiVirus Plus includes automatic updates, intuitive wizards, and well-thought-out default settings to eliminate the need for you to baby-sit your security software and second-guess protection levels. Total Defense’s AntiVirus software is all about top-notch security, made easy. So you can browse, email, send files, and chat online securely and keep your PC running at top condition. Download now to uninstall all security challenges and malicious .exe files. Features: * AntiVirus & AntiSpyware: Prevents viruses, worms, rootkits, and Trojan horses from infecting your PC and protects your computer from existing and new spyware threats. * Continuous Updates: Users never have to worry about upgrading to the latest version of software as long as their subscription is active. They will always be automatically upgraded to the latest version when it is released. With no need to worry about complicated and time consuming product upgrades, it’s seamless, automatic, and simple. Total Defense AntiVirus Plus’ Windows protection is second to none. * Informative Reports: Lets you monitor the status of your computer system by providing real-time reports that show user activity and system alerts. * Intuitive Help Desk: Gives you Fast Facts, Custom Support, and a Help Key that provides you with easy-to-understand information when you need it.
eRepair Access is a fast and functional recovery tool capable of restoring damaged *.mdb and *.accdb files created in Access 2000 and its later versions. Created with simplicity of use and speed of operation in mind, this handy tool allows you to recover valuable information just minutes after a data corruption incident. The wizard-based UI simplifies the entire process to several easy steps. Access recovery has never been easier!
Casper makes maintaining a backup replacement disk for your PC easy by creating a complete, immediately-bootable copy of your PC's hard disk, including the operating system, applications, settings, and all of your data. If your PC's hard disk fails or becomes corrupted, boot your computer directly from your backup hard disk and you're up and running again in seconds. Automate the backup to be performed at any time -- even while you use your PC.
iCare Recovery Free Edition can restore 2GB data from formatted drive, undelete from formatted drive, format recovery, partition deleted recovery, raw file system covert to ntfs/fat to recover lost files, shift+delete performed data loss are all supported data recovery cases by iCare Data Recovery Free, the Windows 7 compatible and comprehensive file recovery tool to recover lost files, photos, mp3, music files etc.
Titanium Antivirus Plus: Essential Protection Trend Micro Titanium™ Antivirus Plus provides easy-to-use security for the tasks you do every day—email, socialise, and surf the web, hassle free. It features: * Antivirus and Antispyware * Antispam * Social networking security * Facebook Privacy Scanner * Windows 8 Secure Browser Titanium is protection made easy. Trend Micro Titanium Antivirus Plus makes security effortless by providing you with a friendly interface that’s a snap to install. It features set-and-forget protection that won’t pester you with annoying alerts and pop-ups. Key Benefits: * Blocks viruses, malware, and dangerous links shared through email and IM * Identifies safe and malicious search result links in Chrome, Internet Explorer, and Firefox * Identifies safe and malicious links in popular social networking sites like Facebook, Twitter, Google+, LinkedIn, and Pinterest * Features a friendly interface that’s a snap to install and use * Provides you with simple screens and clear, easy-to-understand reports Features: Strong antivirus protection made easy From the Titanium main console screen, you can easily run antivirus scans, get up-to-the-minute status reports on your computer's security, and use short cuts to features like the Facebook Privacy Scanner. You can also view the status of your protection, including details about the software, online help, and account information. Detailed security reports Easy-to-read reports give you the details on current computer threats. You can see detailed logs with just one click. Social networking protection Titanium’s social networking security automatically scans your Facebook wall or Twitter feed and shows you safe links by highlighting them in green. Potentially malicious ones are highlighted in red. The colour-coding relies on Trend Micro's cloud-based Smart Protection Network™ infrastructure that continuously analyses threat behavior. When Titanium identifies a bad link, it will even let you easily and quickly warn your friend. Titanium can protect you online and help keep your friends safe too. Facebook Privacy Scanner Titanium’s new Facebook Privacy Scanner provides you with another layer of protection. With a single click, it lets you easily monitor your Facebook page settings and control who can contact you and access your personal information. Titanium will identify which settings may lead to privacy concerns. This feature lets you control which apps can access your bio, who can tag you, see your photos, and more. Web threat protection Titanium pre-sets web threat protection to block malicious links and downloads in emails, instant messages, or websites. This recommended level of security protects you from online phishing scams that try to steal credit card or other personal financial information. You will be warned of unsafe web pages and blocked from accessing them. Personalise your Titanium Customise your Titanium software user interface with a favourite photograph or image. Simply upload your chosen picture to personalise your Titanium experience.
Iperius Backup is one of the best free backup software, also released in commercial editions for those who need advanced backup features for their companies. The freeware version of Iperius Backup allows you to backup to any mass storage device, such as NAS, external USB hard drives, RDX drives, and networked computers. It has comprehensive scheduling and e-mail sending functions. It supports zip compression with no size limit, incremental backup, network authentication and the execution of external scripts and programs.
Kaspersky anti-virus protects you from the Phishing and Malware sites that you wouldn't otherwise know were attempting to steal from you. At the same time, the Kaspersky Security Network allows your computer to report when it discovers a threat that hasn't been seen before. All 250 million Kaspersky users benefit from our combined knowledge! Kaspersky features include: Protects from viruses, Trojans, worms, spyware, adware Scans files, email, and internet traffic Protects Instant Messengers Protects From Unknown Threats Analyzes and closes Internet Explorer vulnerabilities Disables links to malware sites / phishing sites Global Threat Monitoring (Kaspersky Security Network) Blocks all types of keyloggers Automatic Database Updates Free Technical Support Note: This is a 30-day commercial trial.